Mathematica on Linux /tmp/MathLink vulnerability

2010-05-26 / 2010-05-27
Credit: paul szabo
Risk: Low
Local: Yes
Remote: No

Ogólna skala CVSS: 1.9/10
Znaczenie: 2.9/10
Łatwość wykorzystania: 3.4/10
Wymagany dostęp: Lokalny
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Brak
Wpływ na integralność: Częściowy
Wpływ na dostępność: Brak

"If you're doing anything technical, think Mathematica --..." Mathematica7 on Linux uses the /tmp/MathLink directory in insecure ways. Mathematica creates or re-uses an existing /tmp/MathLink directory, and overwrites files within and follows symlinks. This type of behaviour is "known unsafe" on multi-user machines e.g. University login servers. As a classic example of a symlink attack, if an "attacker" uses: mkdir /tmp/MathLink; ln -s /home/victim/.bashrc /tmp/MathLink/.gshmm then when the victim runs Mathematica his ~/.bashrc will be clobbered. New files are created world-writable, allowing a complete compromise of the user account by linking to ~/.bash_logout . (If root ever uses Mathematica then the damage is greater.) Mathematica uses also /tmp/fonts$$.conf in insecure ways. Workaround: use command-line math instead of pretty interface. Notified support (at) wolfram (dot) com [email concealed] on 7 May 2010, was assigned [TS 16194]. Cheers, Paul Szabo psz (at) (dot) au [email concealed] School of Mathematics and Statistics University of Sydney Australia


Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024,


Back to Top